General

  • Target

    JaffaCakes118_0b95cc0d32cd0845a801b7c82429bc2ec4a0a99408de953316c3fa30c10f1d9c

  • Size

    184KB

  • Sample

    241227-bch6msxlcq

  • MD5

    6c4c1c98ad9019be44d15492d4253d77

  • SHA1

    0905ecef8a990c75c20ab01b07da9236a18db8ab

  • SHA256

    0b95cc0d32cd0845a801b7c82429bc2ec4a0a99408de953316c3fa30c10f1d9c

  • SHA512

    77ed0911e437e07a3513f347154c6dac0da572f2202a56f1e9457a8bea12bc4fb4ae7165e5b681016f28c454c24ad6e4f52825e56a77f084c1bf3df50c11510e

  • SSDEEP

    3072:5iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaodlzoxss7:5iLVCIT4WK2z1W+CUHZj4Skq/eaozoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_0b95cc0d32cd0845a801b7c82429bc2ec4a0a99408de953316c3fa30c10f1d9c

    • Size

      184KB

    • MD5

      6c4c1c98ad9019be44d15492d4253d77

    • SHA1

      0905ecef8a990c75c20ab01b07da9236a18db8ab

    • SHA256

      0b95cc0d32cd0845a801b7c82429bc2ec4a0a99408de953316c3fa30c10f1d9c

    • SHA512

      77ed0911e437e07a3513f347154c6dac0da572f2202a56f1e9457a8bea12bc4fb4ae7165e5b681016f28c454c24ad6e4f52825e56a77f084c1bf3df50c11510e

    • SSDEEP

      3072:5iLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaodlzoxss7:5iLVCIT4WK2z1W+CUHZj4Skq/eaozoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks